CompTIA N10-009 Exam Questions
CompTIA Network+ (Page 4 )

Updated On: 17-Apr-2026

Which of the following ports is used for secure email?

  1. 25
  2. 110
  3. 143
  4. 587

Answer(s): D



A client wants to increase overall security after a recent breach.
Which of the following would be best to implement? (Choose two.)

  1. Least privilege network access
  2. Dynamic inventories
  3. Central policy management
  4. Zero-touch provisioning
  5. Configuration drift prevention
  6. Subnet range limits

Answer(s): A,C



Which of the following is a cost-effective advantage of a split-tunnel VPN?

  1. Web traffic is filtered through a web filler.
  2. More bandwidth is required on the company's internet connection.
  3. Monitoring detects insecure machines on the company's network.
  4. Cloud-based traffic flows outside of the company's network.

Answer(s): D



A network technician is troubleshooting a web application's poor performance. The office has two internet links that share the traffic load.
Which of the following tools should the technician use to determine which link is being used for the web application?

  1. netstat
  2. nslookup
  3. ping
  4. tracert

Answer(s): D



Which of the following attacks can cause users who are attempting to access a company website to be directed to an entirely different website?

  1. DNS poisoning
  2. Denial-of-service
  3. Social engineering
  4. ARP spoofing

Answer(s): A



As part of an attack, a threat actor purposefully overflows the content-addressable memory (CAM) table on a switch.
Which of the following types of attacks is this scenario an example of?

  1. ARP spoofing
  2. Evil twin
  3. MAC flooding
  4. DNS poisoning

Answer(s): C



A company's office has publicly accessible meeting rooms equipped with network ports. A recent audit revealed that visitors were able to access the corporate network by plugging personal laptops into open network ports.
Which of the following should the company implement to prevent this in the future?

  1. URL filters
  2. VPN
  3. ACLs
  4. NAC

Answer(s): D



A user notifies a network administrator about losing access to a remote file server. The network administrator is able to ping the server and verifies the current firewall rules do not block access to the network fileshare.
Which of the following tools would help identify which ports are open on the remote file server?

  1. dig
  2. nmap
  3. tracert
  4. nslookup

Answer(s): B



Viewing page 4 of 75
Viewing questions 25 - 32 out of 619 questions



Post your Comments and Discuss CompTIA N10-009 exam dumps with other Community members:

N10-009 Exam Discussions & Posts

AI Tutor AI Tutor 👋 I’m here to help!